# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
eaa0ff02a337da7a9d92b4a413fcb1c8fb61dd501a2d304bd6e50379f3eb8b69
Pseudo Output
02c306253609318fbadcdca0ab7139dd20037479c7d2c9a73a0d382b20181532
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
dcb3c1f38df1c21b9fb27e74438b889143538f55fc9309e0034fd51fab7f4053
Commitment
304c5781c349a466b2683f226b75d5e8b813adca355907666615d5dc864a5f47
Range Proof
672 bytes (Bulletproof)
Memo
5c6b1a5acc42202b6958d883807785e02d7e1b265995e2f8d7658f8f9340e23e19510064325c3a6f75e18a11cb3de7e45457888bc8a18d202fb2cb3b84d83306be4764964da178652eb16a6aa8b65bc9da2028e178908223edd31c0db7993c1cf020c513683e0d60ca21142289cfdcc5ecc93f3380195bd5c937a3eb84905df6 (encrypted)
Stealth Address
727038639925e42ad74f74849f35b9a8630f54aba27c56bff9c4bf3b59ee5824
Commitment
b0cc8a3284563c9bc91ffe2fef44de69df21aab8a98361d735d18332d63a394b
Range Proof
672 bytes (Bulletproof)
Memo
0c64587f2835122eb63a3512bb6f5451c018c8368a0a0b846d5a517563dab59498d3580ece7150263877914d9144d5490981033de7c3427649b940c4d769b9ee656615f22d5ffcd018a8e959362367b8dbbca134b4f59df0b14371e6a9b26ad172f671ae4bdf9151bfe829f64ca7ffc88419f57b36c226f86f7abf25a726493e (encrypted)
Stealth Address
8cac7f4328751e84db0b8e31935d170019f4eb897edc6c587b60789b7f513f3e
Commitment
cc65605414c89d810f76cbeba0af316e6e82b9419adc9f2dcdd31c5188845766
Range Proof
672 bytes (Bulletproof)
Memo
7d431337b271c948d75cde299807f47cf01150c118fe1044e1fcc1504eed078ac77d6bb2f65e8b92c4593a2f10ad61290c46c9dd39d4153a92951850ce5ce89bd66c719c449ab4301e698feea3302829007bceaefb8c299b5c88240902d9afa083f8bd1a4e094e29aace65f5d88b583b70514c957bdea65b42863d3f829e31bf (encrypted)